CN104850769B - Operation executes method and device - Google Patents

Operation executes method and device Download PDF

Info

Publication number
CN104850769B
CN104850769B CN201510205496.0A CN201510205496A CN104850769B CN 104850769 B CN104850769 B CN 104850769B CN 201510205496 A CN201510205496 A CN 201510205496A CN 104850769 B CN104850769 B CN 104850769B
Authority
CN
China
Prior art keywords
wearable device
wearing state
user
current environment
video
Prior art date
Application number
CN201510205496.0A
Other languages
Chinese (zh)
Other versions
CN104850769A (en
Inventor
黄媛媛
胡杨
林俊琦
Original Assignee
北京小米支付技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米支付技术有限公司 filed Critical 北京小米支付技术有限公司
Priority to CN201510205496.0A priority Critical patent/CN104850769B/en
Publication of CN104850769A publication Critical patent/CN104850769A/en
Application granted granted Critical
Publication of CN104850769B publication Critical patent/CN104850769B/en

Links

Abstract

The disclosure discloses a kind of operation execution method and device, belongs to wearable device field.The method, comprising: when monitoring to execute delivery operation and use the identification authentication mode based on wearable device, obtain the wearing state of the wearable device of binding, wearing state includes state and non-wearing state in wearing;Detect whether wearing state is non-wearing state;If wearing state is non-wearing state, forbid executing delivery operation, or, the identification authentication mode based on wearable device is changed to other authentication modes.The disclosure is solved when the non-body-worn wearable device of user, and the authentication mode based on wearable device may unsafe problem;Even if having reached the non-body-worn wearable device of user, the problem of network property of user can also be effectively protected.

Description

Operation executes method and device

Technical field

This disclosure relates to wearable device field, in particular to a kind of operation executes method and device.

Background technique

Mobile payment is a kind of means of payment paid using mobile terminal, and the form of mobile payment may is that two Tie up code form of payment, sound wave form of payment, fingerprint form of payment and the form of payment based on wearable device.

The relevant technologies provide a kind of method of mobile payment based on wearable device: mobile terminal is executing payment behaviour When making, detect whether the distance between the mobile terminal and the wearable device bound with it are less than preset distance;If being less than Preset distance, then mobile terminal execution delivery operation.

Summary of the invention

The disclosure provides a kind of operation execution method and device.The technical solution is as follows:

According to the first aspect of the embodiments of the present disclosure, a kind of operation execution method is provided, this method comprises:

When monitoring to execute delivery operation and the currently employed identification authentication mode based on wearable device, acquisition is tied up The wearing state of fixed wearable device, wearing state include state and non-wearing state in wearing;

Detect whether wearing state is non-wearing state;

If wearing state is non-wearing state, forbid executing delivery operation, or, by the identity based on wearable device Authentication mode is changed to other authentication modes.

In one embodiment, the wearing state of the wearable device of binding is obtained, comprising:

The current biometric data of user is obtained by the wearable device of binding;According to the current of user can be got Biological data obtains wearing state;

Or,

The preset interface of the wearable device of binding is called, obtains wearing state, wearing state is wearable device It is obtained according to the current biometric data that can collect user.

In one embodiment, the identification authentication mode based on wearable device is changed to other authentication sides Formula, comprising:

Identification authentication mode based on wearable device is changed to cipher authentication mode;Or,

Identification authentication mode based on wearable device is changed to finger print identifying mode;Or,

Identification authentication mode based on wearable device is changed to gesture authentication mode;Or,

Identification authentication mode based on wearable device is changed to electronic passwords authentication mode.

In one embodiment, this method further include:

At least one of if wearing state is non-wearing state, perform the following operations:

The image or video of current environment are acquired by front camera;

The image or video of current environment are acquired by rear camera;

The image or video of current environment are acquired by the camera of binding;

The sound of current environment is acquired by microphone.

In one embodiment, this method further include:

If the authentication failed number of other authentication modes reaches preset times, perform the following operations at least one Kind:

The image or video of current environment are acquired by front camera;

The image or video of current environment are acquired by rear camera;

The image or video of current environment are acquired by the camera of binding;

The sound of current environment is acquired by microphone.

According to the second aspect of the disclosure, a kind of operation executive device is provided, which includes:

Module is obtained, is configured as monitoring to execute delivery operation and the currently employed identity based on wearable device When authentication mode, the wearing state of the wearable device of binding is obtained, wearing state is including state in wearing and does not wear shape State;

Detection module, is configured as whether detection wearing state is non-wearing state;

Forbid execution module, is configured as forbidding executing delivery operation when wearing state is non-wearing state, or, side Formula replaces module, is configured as the identification authentication mode based on wearable device being changed to other authentication modes.

In one embodiment, module is obtained, is configured as obtaining the current of user by the wearable device of binding Biological data;Wearing state is obtained according to the current biometric data that can get user;Or, obtaining module, it is configured as adjusting With the preset interface of the wearable device of binding, wearing state is obtained, can wearing state be wearable device according to adopting The current biometric data for collecting user is obtained.

In one embodiment, mode replaces module, and being configured as will be based on the identification authentication mode of wearable device It is changed to cipher authentication mode;Or,

Mode replaces module, is configured as the identification authentication mode based on wearable device being changed to finger print identifying side Formula;Or,

Mode replaces module, is configured as the identification authentication mode based on wearable device being changed to gesture authentication side Formula;Or,

Mode replaces module, is configured as the identification authentication mode based on wearable device being changed to electronic passwords and recognize Card mode.

In one embodiment, the device further include:

First execution module is configured as when wearing state is in non-wearing state, perform the following operations at least It is a kind of:

The image or video of current environment are acquired by front camera;

The image or video of current environment are acquired by rear camera;

The image or video of current environment are acquired by the camera of binding;

The sound of current environment is acquired by microphone.

In one embodiment, the device further include:

First execution module is configured as when the authentication failed number of other authentication modes reaches preset times, At least one of perform the following operations:

The image or video of current environment are acquired by front camera;

The image or video of current environment are acquired by rear camera;

The image or video of current environment are acquired by the camera of binding;

The sound of current environment is acquired by microphone.

According to the third aspect of the disclosure, a kind of operation executive device is provided, which includes:

Processor;

For storing the memory of the processor-executable instruction;

Wherein, which is configured as:

When monitoring to execute delivery operation and use the identification authentication mode based on wearable device, binding is obtained The wearing state of wearable device, wearing state include state and non-wearing state in wearing;

Detect whether wearing state is non-wearing state;

If wearing state is non-wearing state, forbid executing the delivery operation, or, by this based on wearable device Identification authentication mode is changed to other authentication modes.

The technical scheme provided by this disclosed embodiment can include the following benefits:

By obtaining the wearing state of the wearable device of binding, when wearing state is non-wearing state, forbid holding Row delivery operation uses other authentication modes;It solves when the non-body-worn wearable device of user, being based on can The authentication mode of wearable device may unsafe problem;Even if having reached the non-body-worn wearable device of user, The problem of network property of user can also be effectively protected.

It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited It is open.

Detailed description of the invention

The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and consistent with the instructions for explaining the principles of this disclosure.

Fig. 1 is the schematic diagram for implementing a kind of implementation environment exemplified according to exemplary partial;

Fig. 2 is a kind of flow chart for operating execution method shown according to an exemplary embodiment;

Fig. 3 is that a kind of operation shown according to another exemplary embodiment executes the flow chart of method;

Fig. 4 is that a kind of operation shown according to another exemplary embodiment executes interface schematic diagram of the method when implementing;

Fig. 5 is that a kind of operation shown according to another exemplary embodiment executes the flow chart of method;

Fig. 6 is that a kind of operation shown according to another exemplary embodiment executes the flow chart of method;

Fig. 7 is a kind of block diagram for operating executive device shown according to an exemplary embodiment;

Fig. 8 is a kind of block diagram for operating executive device shown according to an exemplary embodiment;

Fig. 9 is a kind of block diagram for operating executive device shown according to an exemplary embodiment.

Specific embodiment

Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.

When user does not have body-worn wearable device, malicious user can be taken under the premise of user is unwitting Wearable device, if there is malicious user executes delivery operation using the method for mobile payment that the relevant technologies provide, then only Need the wearable device by the mobile terminal of user close to user, so that it may which authentication passes through and smoothly executes payment Operation, which results in user's properties maliciously to be shifted.In order to avoid similar problems, the embodiment of the present disclosure is provided as shown below The embodiment of meaning property:

Fig. 1 is a kind of schematic diagram of implementation environment shown according to an exemplary embodiment.The implementation environment includes that can wear Wear formula equipment 120, mobile terminal 140 and background server 160.

Wearable device 120 can be Intelligent bracelet, Intelligent glove, smartwatch, intelligent ring and intelligent dress ornament Deng.Various sensors, such as gravity accelerometer, gyro sensor, the heart are usually provided in wearable device 120 Rate sensor and biopotential sensor etc..Wearable device 120 has the biological data that user is acquired by built-in sensors Ability.Biological data can be limb action, pulse, heart rate, bioelectricity of user etc..With wearable device 120 in Fig. 1 It is Intelligent bracelet to illustrate.

Wearable device 120 can be connected by Bluetooth technology, WiFi technology etc. with mobile terminal 140.

Mobile terminal 140 can be the electronic equipments such as smart phone, intelligent router, tablet computer.Mobile terminal 140 can To pre-establish binding relationship with wearable device 120.Illustrate in Fig. 1 with mobile terminal 140 is smart phone.It is mobile whole End 140 has the ability for executing delivery operation.

Mobile terminal 140 is connected by cable network or wireless network with background server 160.

Background server 160 is that mobile terminal 140 provides the server of back-office support when executing delivery operation.

Fig. 2 is the flow chart of operation execution method shown according to an exemplary embodiment.The present embodiment is held with the operation Row method is applied to illustrate in mobile terminal shown in FIG. 1.This method comprises:

In step 202, it is monitoring to execute delivery operation and is using the identification authentication mode based on wearable device When, obtain the wearing state of the wearable device of binding.

Wearing state includes state and non-wearing state in wearing.

In step 204, whether detection wearing state is non-wearing state.

In step 206, if wearing state is non-wearing state, forbid executing delivery operation, or, will be based on wearable The identification authentication mode of formula equipment is changed to other authentication modes.

In conclusion operation execution method provided in this embodiment, the wearing of the wearable device by obtaining binding State forbids executing delivery operation or uses other authentication modes when wearing state is non-wearing state;It solves and works as When the non-body-worn wearable device of user, the authentication mode based on wearable device may unsafe problem;It reaches Even if having arrived the non-body-worn wearable device of user, the problem of network property of user can also be effectively protected.

Fig. 3 is the flow chart of the operation execution method shown according to another exemplary embodiment.The present embodiment is still with this Operation execution method is applied to mobile terminal shown in FIG. 1 to illustrate.This method comprises:

In step 301, the identification authentication mode based on wearable device is enabled to delivery operation;

Mobile terminal usually requires the authentication for carrying out user when executing delivery operation.The mode of authentication Including but not limited to: cipher authentication mode, finger print identifying mode, identifying code authentication mode, electronic passwords authentication mode, gesture are recognized Card mode and identification authentication mode based on wearable device.

Cipher authentication mode is that user inputs n preset passwords in the terminal to carry out the mode of authentication.

Finger print identifying mode is that user inputs user fingerprints in the terminal to carry out the mode of authentication.

Identifying code authentication mode is that background server provides a user identifying code, and user inputs the verifying in the terminal Code carries out the mode of authentication.

Electronic passwords authentication mode is to provide a user electronic passwords generator in advance, which has life At the ability of dynamic password, the dynamic password that user inputs the generation of electronic passwords generator in the terminal carries out authentication Mode.

Gesture authentication mode is that user inputs default gesture on the touch screen of mobile terminal, or by mobile terminal Sports type sensor make default gesture to carry out the mode of authentication.

Identification authentication mode based on wearable device is the side that user carries out authentication by wearable device Formula.For example, authentication passes through when the distance between mobile terminal and the wearable device of binding is less than pre-determined distance; For another example, it is monitoring in the preset time after execution delivery operation, user is made default using the wearable device of binding Collected action data is sent to mobile terminal by gesture, wearable device, and mobile terminal determines the action data and pre- If gesture motion matching when, authentication passes through.

User can enable wearable device authentication mode to delivery operation in the terminal.Referring to fig. 4, with branch For paying operation and being mobile-phone payment, user chooses " verifying identity using Intelligent bracelet " option in set interface 40, to be Mobile-phone payment function enables wearable device authentication mode.

In step 302, it is monitoring to execute delivery operation and current identification authentication mode is wearable device certification When mode, the current biometric data of user is obtained by the wearable device of binding;

When user executes delivery operation to mobile terminal request, mobile terminal is obtained by the wearable device of binding The current biometric data of user.

It is Intelligent bracelet with wearable device, current biometric data is the wrist movement data instance of user, wearable Formula equipment acquires the wrist movement data of user by built-in gravity accelerometer, and mobile terminal is obtained by bluetooth connection Take the collected wrist movement data of wearable device.

In step 303, can wearing state be obtained according to the current biometric data that get user.

Since when user does not wear wearable device, wearable device can not collect the current biological number of user According to, so:

If the current biometric data of user can be got, mobile terminal determines that wearable device is in shape in wearing State.

If the current biometric data of user can not be got, mobile terminal determines that wearable device is in and does not wear State.

In step 304, whether detection wearing state is non-wearing state;

If wearing state is state in wearing, 305 are entered step;If wearing state is non-wearing state, enter step Rapid 306.

In step 305, if wearing state is state in wearing, identity is carried out by the wearable device bound and is recognized Card, and when authentication passes through, execute delivery operation.

If wearing state is state in wearing, mobile terminal carries out authentication by the wearable device of binding Step, the step can be any one in following three kinds of implementations:

The first possible embodiment, mobile terminal detection and the wearable device of binding connect with the presence or absence of bluetooth It connects, and the signal strength of the bluetooth connection is higher than preset threshold.The signal strength can be used for characterizing mobile terminal with it is wearable The distance between formula equipment.

When there are bluetooth connections, and the signal strength of the bluetooth connection is higher than preset threshold, mobile terminal determines identity Certification passes through.When being lower than preset threshold there is no the signal strength of bluetooth connection or bluetooth connection, mobile terminal determines identity Authentification failure.

Second of possible embodiment, mobile terminal display reminding information, the prompt information are used to indicate user and make Prearranged gesture;Acquisition for mobile terminal wearable device is (such as 5 seconds within the scheduled duration period after display reminding information It is interior) action data of user collected;Mobile terminal detects whether the action data matches with prearranged gesture;If matching, Mobile terminal determines that authentication passes through, if mismatching, mobile terminal determines that authentication fails.

The third possible embodiment, mobile terminal are by the current wearing user of wearable device detection bound It is no to belong to pre-set user.The detection process by collected current biometric data and is preset by mobile terminal or wearable device The history biological data of user is matched to carry out.If current biometric data is matched with the history biological data of pre-set user, Then mobile terminal determines that authentication passes through;If the history biological data of current biometric data and pre-set user mismatches, move Dynamic terminal determines that authentication fails.

When authentication passes through, mobile terminal execution delivery operation.For example, mobile terminal completes delivery operation.It executes Delivery operation may need to be completed by the interaction of mobile terminal and background server.

Within step 306, if wearing state is non-wearing state, forbid executing delivery operation.

If wearable device is in non-wearing state, mobile terminal is forbidden executing delivery operation.

In step 307, if wearing state is non-wearing state, at least one of predetermined operation is executed.

Optionally, if wearable device is in non-wearing state, the use of delivery operation is executed to mobile terminal request Family may be malicious user.In order to record at least one of the information of malicious user, the following predetermined operation of mobile terminal execution:

The image or video of current environment are acquired by front camera;

The image or video of current environment are acquired by rear camera;

The image or video of current environment are acquired by the camera of binding;

The sound of current environment is acquired by microphone.

Optionally, the image of collected current environment or video or sound are also sent to background service by mobile terminal Device, alternatively, being sent to associated other terminals.Associated other terminals can be spouse, parent, used in children it is mobile eventually End.

In conclusion operation execution method provided in this embodiment, the wearing of the wearable device by obtaining binding State forbids executing delivery operation or uses other authentication modes when wearing state is non-wearing state;It solves and works as When the non-body-worn wearable device of user, the authentication mode based on wearable device may unsafe problem;It reaches Even if having arrived the non-body-worn wearable device of user, the problem of network property of user can also be effectively protected.

Operation execution method provided in this embodiment, also by executing when wearable device is in non-wearing state At least one predetermined operation can be protected preferably so that mobile terminal is able to record the doubtful relevant information for malicious user The network property of user.

In another possible embodiment, since the computing capability of wearable device is stronger, analyze wearable The step of wearing state of equipment, can be executed by wearable device.That is, step 303 and step 304 can be realized by substitution As step 303a, referring to Fig. 5:

In step 303a, the preset interface of the wearable device of binding is called, obtains wearing state, wearing state is Can wearable device obtained according to the current biometric data that collect user.

Wearable device can constantly acquire the biological data of user, and then can interval basis adopt at predetermined time intervals Collect the biological data of user to analyze to obtain wearing state, and caches the wearing shape that a nearest time interval is analyzed State.

Meanwhile wearable device can also provide preset interface, when which is used to be called by mobile terminal, instead Present wearing state.

When monitoring to execute delivery operation, mobile terminal calls the preset interface of the wearable device of binding, obtains Wearing state.

In another possible embodiment, step 306 and step 307 are implemented as step 306a and step by alternative 307a, referring to Fig. 6:

In step 306a, if wearing state is non-wearing state, more by current wearable device authentication mode It is changed to other authentication modes.

This step can be following either step:

Identification authentication mode based on wearable device is changed to cipher authentication mode by mobile terminal;Or,

Identification authentication mode based on wearable device is changed to finger print identifying mode by mobile terminal;Or,

Identification authentication mode based on wearable device is changed to gesture authentication mode by mobile terminal;Or,

Identification authentication mode based on wearable device is changed to electronic passwords authentication mode by mobile terminal.

Since in identifying code authentication mode, identifying code is usually all transmitted directly to mobile terminal, mobile terminal is disliked Meaning user using when be easy to be leaked, so other identification authentication modes in this step do not include identifying code authentication mode, But the present embodiment does not limit this.

If the wearing state of wearable device is non-wearing state, other authentication modes are able to verify that success, then Mobile terminal also executes delivery operation.Executing delivery operation may need by the interaction of mobile terminal and background server Lai complete At.

In step 307a, if the authentication failed number of other authentication modes reaches preset times, execute predetermined At least one of operation.

Optionally, if the wearing state of wearable device is non-wearing state, and the verifying of other authentication modes The frequency of failure reaches preset times, then the user that mobile terminal is used may be malicious user.In order to record malicious user Information, at least one of following predetermined operation of mobile terminal execution:

The image or video of current environment are acquired by front camera;

The image or video of current environment are acquired by rear camera;

The image or video of current environment are acquired by the camera of binding;

The sound of current environment is acquired by microphone.

Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.

Fig. 7 is the structural block diagram of operation executive device shown according to an exemplary embodiment.The operation executive device Can by software, hardware or both be implemented in combination with as mobile terminal all or part of.The device includes:

Module 720 is obtained, is configured as monitoring to execute delivery operation and currently employed based on wearable device When identification authentication mode, the wearing state of the wearable device of binding is obtained.Wearing state is including state in wearing and does not wear Wear state.

Detection module 740, be configured as detection wearing state be in just be in non-wearing state in wearing state;

Forbid execution module 760, be configured as when wearing state is in non-wearing state, forbids executing delivery operation, Or, mode replaces module 780, it is configured as the identification authentication mode based on wearable device being changed to other authentications Mode.

In conclusion operation executive device provided in this embodiment, the wearing of the wearable device by obtaining binding State forbids executing delivery operation or uses other authentication modes when wearing state is non-wearing state;It solves and works as When the non-body-worn wearable device of user, the authentication mode based on wearable device may unsafe problem;It reaches Even if having arrived the non-body-worn wearable device of user, the problem of network property of user can also be effectively protected.

Fig. 8 is the structural block diagram of operation executive device shown according to an exemplary embodiment.The operation executive device Can by software, hardware or both be implemented in combination with as mobile terminal all or part of.The device includes:

Module 720 is obtained, is configured as monitoring to execute delivery operation and currently employed based on wearable device When identification authentication mode, the wearing state of the wearable device of binding is obtained.Wearing state is including state in wearing and does not wear Wear state.

Detection module 740, is configured as whether detection wearing state is non-wearing state.

Forbid execution module 760, is configured as forbidding executing delivery operation when wearing state is non-wearing state, or, Mode replaces module 780, is configured as the identification authentication mode based on wearable device being changed to other authentication sides Formula.

Optionally, module 720 is obtained, is configured as obtaining the current biological number of user by the wearable device of binding According to;Wearing state is obtained according to the current biometric data that can get user;Or, obtaining module 720, it is configured as calling and ties up The preset interface of fixed wearable device, obtains wearing state, and can wearing state be wearable device according to collecting The current biometric data of user is obtained.

Optionally, mode replaces module 780, is configured as the identification authentication mode based on wearable device being changed to Cipher authentication mode;Or,

Mode replaces module 780, is configured as the identification authentication mode based on wearable device being changed to fingerprint and recognize Card mode;Or,

Mode replaces module 780, is configured as the identification authentication mode based on wearable device being changed to gesture and recognize Card mode;Or,

Mode replaces module 780, is configured as the identification authentication mode based on wearable device being changed to electronics mouth Enable authentication mode.

Optionally, the device further include:

First execution module 792, be configured as wearing state be non-wearing state when, perform the following operations at least It is a kind of:

The image or video of current environment are acquired by front camera;

The image or video of current environment are acquired by rear camera;

The image or video of current environment are acquired by the camera of binding;

The sound of current environment is acquired by microphone.

Optionally, the device further include:

Second execution module 794 is configured as reaching preset times in the authentication failed number of other authentication modes At least one of when, perform the following operations:

The image or video of current environment are acquired by front camera;

The image or video of current environment are acquired by rear camera;

The image or video of current environment are acquired by the camera of binding;

The sound of current environment is acquired by microphone.

In conclusion operation executive device provided in this embodiment, the wearing of the wearable device by obtaining binding State forbids executing delivery operation or uses other authentication modes when wearing state is non-wearing state;It solves and works as When the non-body-worn wearable device of user, the authentication mode based on wearable device may unsafe problem;It reaches Even if having arrived the non-body-worn wearable device of user, the problem of network property of user can also be effectively protected.

Operation executive device provided in this embodiment, also by executing when wearable device is in non-wearing state At least one predetermined operation can be protected preferably so that mobile terminal is able to record the doubtful relevant information for malicious user The network property of user.

About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.

Fig. 9 is a kind of block diagram for operating executive device shown according to an exemplary embodiment.For example, device 900 can be with It is mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, body-building Equipment, personal digital assistant etc..

Referring to Fig. 9, device 900 may include following one or more components: processing component 902, memory 904, power supply Component 906, multimedia component 908, audio component 910, input/output (I/O) interface 912, sensor module 914, Yi Jitong Believe component 916.

The integrated operation of the usual control device 900 of processing component 902, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing component 902 may include that one or more processors 918 refer to execute It enables, to perform all or part of the steps of the methods described above.In addition, processing component 902 may include one or more modules, just Interaction between processing component 902 and other assemblies.For example, processing component 902 may include multi-media module, it is more to facilitate Interaction between media component 908 and processing component 902.

Memory 904 is configured as storing various types of data to support the operation in device 900.These data are shown Example includes the instruction of any application or method for operating on device 900, contact data, and telephone book data disappears Breath, picture, video etc..Memory 904 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash Device, disk or CD.

Power supply module 906 provides electric power for the various assemblies of device 900.Power supply module 906 may include power management system System, one or more power supplys and other with for device 900 generate, manage, and distribute the associated component of electric power.

Multimedia component 908 includes the screen of one output interface of offer between device 900 and user.In some realities It applies in example, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can To be implemented as touch screen, to receive input signal from the user.Touch panel include one or more touch sensors with Sense the gesture on touch, slide, and touch panel.Touch sensor can not only sense the boundary of a touch or slide action, and And also detect duration and pressure relevant to touch or slide.In some embodiments, multimedia component 908 includes One front camera and/or rear camera.It is such as in a shooting mode or a video mode, preceding when device 900 is in operation mode It sets camera and/or rear camera can receive external multi-medium data.Each front camera and rear camera can Be a fixed optical lens system or have focusing and optical zoom capabilities.

Audio component 910 is configured as output and/or input audio signal.For example, audio component 910 includes a Mike Wind (MIC), when device 900 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched It is set to reception external audio signal.The received audio signal can be further stored in memory 904 or via communication set Part 916 is sent.In some embodiments, audio component 910 further includes a loudspeaker, is used for output audio signal.

I/O interface 912 provides interface between processing component 902 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.

Sensor module 914 includes one or more sensors, and the state for providing various aspects for device 900 is commented Estimate.For example, sensor module 914 can detecte the state that opens/closes of device 900, the relative positioning of component, such as component For the display and keypad of device 900, sensor module 914 can be with the position of 900 1 components of detection device 900 or device Set change, the existence or non-existence that user contacts with device 900, the temperature in 900 orientation of device or acceleration/deceleration and device 900 Variation.Sensor module 914 may include proximity sensor, be configured to detect without any physical contact near The presence of object.Sensor module 914 can also include optical sensor, such as CMOS or ccd image sensor, for answering in imaging With middle use.In some embodiments, which can also include acceleration transducer, gyro sensor, magnetic Sensor, pressure sensor or temperature sensor.

Communication component 916 is configured to facilitate the communication of wired or wireless way between device 900 and other equipment.Device 900 can access the wireless network based on communication standard, such as Wi-Fi, 2G or 3G or their combination.In an exemplary reality It applies in example, communication component 916 receives broadcast singal or the related letter of broadcast from external broadcasting management system via broadcast channel Breath.In one exemplary embodiment, communication component 916 further includes near-field communication (NFC) module, to promote short range communication.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.

In the exemplary embodiment, device 900 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, execute method for executing aforesaid operations.

In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 904 of instruction, above-metioned instruction can be executed by the processor 918 of device 900 to complete the aforesaid operations side of execution Method.For example, non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, Floppy disk and optical data storage devices etc..

Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.

It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (9)

1. a kind of operation execution method, which is characterized in that be applied in mobile terminal, which comprises
When monitoring to execute delivery operation and use the identification authentication mode based on wearable device, wearing for binding is obtained The wearing state of formula equipment is worn, the wearing state includes state and non-wearing state in wearing;
Detect whether the wearing state is non-wearing state;
If the wearing state is the non-wearing state, forbid executing the delivery operation, or, will be described based on wearable The identification authentication mode of formula equipment is changed to other authentication modes;
It determines that executing the user of delivery operation may be malicious user, and acquires the image or video or sound of current environment, it will The image or video or sound of collected current environment are sent to background server, alternatively, being sent to associated other terminals;
Wherein, the wearing state of the wearable device for obtaining binding, comprising:
The current biometric data of user is obtained by the wearable device of binding;According to the current of user can be got Biological data obtains the wearing state;
Or,
The preset interface for calling the wearable device of binding, obtains the wearing state, the wearing state is described Can wearable device obtained according to the current biometric data that collect user.
2. the method according to claim 1, wherein described by the authentication based on wearable device Mode is changed to other authentication modes, comprising:
The identification authentication mode based on wearable device is changed to cipher authentication mode;Or,
The identification authentication mode based on wearable device is changed to finger print identifying mode;Or,
The identification authentication mode based on wearable device is changed to gesture authentication mode;Or,
The identification authentication mode based on wearable device is changed to electronic passwords authentication mode.
3. method according to claim 1 or 2, which is characterized in that the image or video or sound of the acquisition current environment At least one of sound, including following manner:
The image or video of current environment are acquired by front camera;
The image or video of current environment are acquired by rear camera;
The image or video of current environment are acquired by the camera of binding;
The sound of current environment is acquired by microphone.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
If the authentication failed number of other authentication modes reaches preset times, perform the following operations at least one Kind:
The image or video of current environment are acquired by front camera;
The image or video of current environment are acquired by rear camera;
The image or video of current environment are acquired by the camera of binding;
The sound of current environment is acquired by microphone.
5. a kind of operation executive device, which is characterized in that described device includes:
Module is obtained, is configured as monitoring to execute delivery operation and using the identification authentication mode based on wearable device When, the wearing state of the wearable device of binding is obtained, the wearing state includes state and non-wearing state in wearing;
Detection module is configured as detecting whether the wearing state is non-wearing state;
Forbid execution module, be configured as when the wearing state is the non-wearing state, forbids executing the payment behaviour Make, or, mode replaces module, is configured as the identification authentication mode based on wearable device being changed to other identity Verification mode;
Described device is additionally configured to determine that executing the user of delivery operation may be malicious user, and acquires the figure of current environment Picture or video or sound, are sent to background server for the image of collected current environment or video or sound, alternatively, sending To associated other terminals;
Wherein, the acquisition module is configured as obtaining the current biological number of user by the wearable device of binding According to;The wearing state is obtained according to the current biometric data that can get user;
Or,
The acquisition module is generally configured to call the preset interface of the wearable device of binding, obtains the pendant State is worn, can the wearing state be the wearable device according to obtained by collect the current biometric data of user 's.
6. device according to claim 5, which is characterized in that
The mode replaces module, is configured as the identification authentication mode based on wearable device being changed to password and recognize Card mode;Or,
The mode replaces module, is configured as the identification authentication mode based on wearable device being changed to fingerprint and recognize Card mode;Or,
The mode replaces module, is configured as the identification authentication mode based on wearable device being changed to gesture and recognize Card mode;Or,
The mode replaces module, is configured as the identification authentication mode based on wearable device being changed to electronics mouth Enable authentication mode.
7. device according to claim 5 or 6, which is characterized in that described device further include:
At least one of first execution module, be configured to perform the following operations:
The image or video of current environment are acquired by front camera;
The image or video of current environment are acquired by rear camera;
The image or video of current environment are acquired by the camera of binding;
The sound of current environment is acquired by microphone.
8. device according to claim 5 or 6, which is characterized in that described device further include:
Second execution module is configured as when the authentication failed number of other authentication modes reaches preset times, At least one of perform the following operations:
The image or video of current environment are acquired by front camera;
The image or video of current environment are acquired by rear camera;
The image or video of current environment are acquired by the camera of binding;
The sound of current environment is acquired by microphone.
9. a kind of operation executive device, which is characterized in that described device includes:
Processor;
For storing the memory of the processor-executable instruction;
Wherein, the processor is configured to:
When monitoring to execute delivery operation and use the identification authentication mode based on wearable device, wearing for binding is obtained The wearing state of formula equipment is worn, the wearing state includes state and non-wearing state in wearing;
Detect whether the wearing state is non-wearing state;
If the wearing state is the non-wearing state, forbid executing the delivery operation, or, will be described based on wearable The identification authentication mode of formula equipment is changed to other authentication modes;
It determines that executing the user of delivery operation may be malicious user, and acquires the image or video or sound of current environment, it will The image or video or sound of collected current environment are sent to background server, alternatively, being sent to associated other terminals;
Wherein, the wearing state of the wearable device for obtaining binding, comprising:
The current biometric data of user is obtained by the wearable device of binding;According to the current of user can be got Biological data obtains the wearing state;
Or,
The preset interface for calling the wearable device of binding, obtains the wearing state, the wearing state is described Can wearable device obtained according to the current biometric data that collect user.
CN201510205496.0A 2015-04-27 2015-04-27 Operation executes method and device CN104850769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510205496.0A CN104850769B (en) 2015-04-27 2015-04-27 Operation executes method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510205496.0A CN104850769B (en) 2015-04-27 2015-04-27 Operation executes method and device

Publications (2)

Publication Number Publication Date
CN104850769A CN104850769A (en) 2015-08-19
CN104850769B true CN104850769B (en) 2019-03-15

Family

ID=53850409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510205496.0A CN104850769B (en) 2015-04-27 2015-04-27 Operation executes method and device

Country Status (1)

Country Link
CN (1) CN104850769B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105139194B (en) * 2015-09-30 2019-09-24 联想(北京)有限公司 A kind of method that establishing connection, electronic equipment and the system for establishing connection
CN105301948A (en) * 2015-10-09 2016-02-03 惠州Tcl移动通信有限公司 Intelligent wristwatch, screen locking management method and screen locking management system thereof
CN106571493A (en) * 2015-10-13 2017-04-19 璁镐赴 Intelligent controllable battery
CN105389701A (en) * 2015-11-05 2016-03-09 大唐微电子技术有限公司 Secure consumption method and apparatus of wearable equipment
CN105718771A (en) * 2016-01-15 2016-06-29 广东小天才科技有限公司 Private mode control method and system
US20190058763A1 (en) * 2016-03-04 2019-02-21 Motorola Solutions, Inc. Method and system for cloning data using a wearable electronic device
CN105809438A (en) * 2016-03-17 2016-07-27 广东乐心医疗电子股份有限公司 Identity recognition method and payment method and device for smart wearable equipment
CN106210011A (en) * 2016-06-30 2016-12-07 珠海市魅族科技有限公司 A kind of message prompt method and device
CN106204039A (en) * 2016-06-30 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of safe payment method and system
US10251056B2 (en) * 2016-07-13 2019-04-02 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
US10372892B2 (en) 2016-07-13 2019-08-06 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
CN106296189A (en) * 2016-07-25 2017-01-04 北京小米移动软件有限公司 Electronic transaction safe verification method and device and electronic equipment
CN106251139A (en) * 2016-07-29 2016-12-21 广东小天才科技有限公司 A kind of method of payment for mobile terminal and device
CN106445141B (en) * 2016-09-23 2019-09-17 广东小天才科技有限公司 A kind of control method and device of capacitance touch screen terminal
US20190340348A1 (en) * 2016-10-21 2019-11-07 Huawei Technologies Co., Ltd. Security verification method and device
CN106686528A (en) * 2016-12-21 2017-05-17 上海斐讯数据通信技术有限公司 Data transmission method and system as well as master device and slave device
CN107194218A (en) * 2017-05-27 2017-09-22 广州三星通信技术研究有限公司 Adjust the method and device of identification authentication mode

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964126A (en) * 2010-09-13 2011-02-02 中兴通讯股份有限公司 Mobile terminal payment method and mobile terminal
CN103106736A (en) * 2012-12-28 2013-05-15 华为软件技术有限公司 Identity authentication method, terminal and server
CN104182871A (en) * 2014-02-19 2014-12-03 钟一鸣 Mobile payment system and smart wristband
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment
CN104283876A (en) * 2014-09-29 2015-01-14 小米科技有限责任公司 Operation authorization method and device
CN104331796A (en) * 2014-11-04 2015-02-04 北京握奇智能科技有限公司 Wearable device and working method thereof
CN104346548A (en) * 2013-08-01 2015-02-11 华为技术有限公司 Wearable equipment and authentication method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008008830A2 (en) * 2006-07-11 2008-01-17 Mastercard International Incorporated Wearable contactless payment devices
US9016565B2 (en) * 2011-07-18 2015-04-28 Dylan T X Zhou Wearable personal digital device for facilitating mobile device payments and personal use

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964126A (en) * 2010-09-13 2011-02-02 中兴通讯股份有限公司 Mobile terminal payment method and mobile terminal
CN103106736A (en) * 2012-12-28 2013-05-15 华为软件技术有限公司 Identity authentication method, terminal and server
CN104346548A (en) * 2013-08-01 2015-02-11 华为技术有限公司 Wearable equipment and authentication method thereof
CN104182871A (en) * 2014-02-19 2014-12-03 钟一鸣 Mobile payment system and smart wristband
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment
CN104283876A (en) * 2014-09-29 2015-01-14 小米科技有限责任公司 Operation authorization method and device
CN104331796A (en) * 2014-11-04 2015-02-04 北京握奇智能科技有限公司 Wearable device and working method thereof

Also Published As

Publication number Publication date
CN104850769A (en) 2015-08-19

Similar Documents

Publication Publication Date Title
CN104503688B (en) The control method and device of intelligent hardware devices
US20160379205A1 (en) Facilitating transactions with a user account using a wireless device
CN104052867A (en) Mobile terminal and controlling method thereof
CN104714414B (en) The control method and device of smart home device, electronic equipment
CN104866750B (en) Using startup method and apparatus
EP2960822B1 (en) Method and device for locking file
WO2016061929A1 (en) Terminal exception handling method and device, and electronic equipment
CN104283876A (en) Operation authorization method and device
CN104035558A (en) Terminal device control method and device
CN104898473A (en) Method of handling terminal equipment and device
CN104008348A (en) Application program control method, application program control device and terminal
CN103916233B (en) A kind of information ciphering method and device
CN104794382A (en) Application starting method and device
CN104063655B (en) A kind of method and apparatus handling child mode
CN105224195A (en) Terminal operation method and device
CN104159218B (en) Internetwork connection establishing method and device
EP3041206B1 (en) Method and device for displaying notification information
CN104156071A (en) Method and device for setting screen password and unlocking screen
CN104125335A (en) Method, device and system for managing authority
CN105120122A (en) Alarm method and device
CN104850769A (en) Method and device for executing operation
JP2018523393A (en) Method and apparatus for enabling a touch screen display of a mobile device
CN103957103A (en) Safety authentication method and device and mobile terminal
CN105160239A (en) Application program access restriction method and apparatus
EP3089065B1 (en) Method and device for permission management

Legal Events

Date Code Title Description
C06 Publication
EXSB Decision made by sipo to initiate substantive examination
TA01 Transfer of patent application right
GR01 Patent grant